CVE Vulnerabilities

CVE-2017-3143

Published: Jan 16, 2019 | Modified: Oct 03, 2019
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Ubuntu
MEDIUM

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.

Affected Software

Name Vendor Start Version End Version
Bind Isc 9.4.0 (including) 9.8.8 (including)
Bind Isc 9.9.0 (including) 9.9.10 (including)
Bind Isc 9.10.0 (including) 9.10.5 (including)
Bind Isc 9.11.0 (including) 9.11.1 (including)
Bind Isc 9.9.0-p1 (including) 9.9.0-p1 (including)
Bind Isc 9.9.3-s1 (including) 9.9.3-s1 (including)
Bind Isc 9.9.10-s2 (including) 9.9.10-s2 (including)
Bind Isc 9.10.5-p1 (including) 9.10.5-p1 (including)
Bind Isc 9.10.5-s1 (including) 9.10.5-s1 (including)
Bind Isc 9.10.5-s2 (including) 9.10.5-s2 (including)
Bind Isc 9.11.1-p1 (including) 9.11.1-p1 (including)
Bind9 Ubuntu artful *
Bind9 Ubuntu devel *
Bind9 Ubuntu trusty *
Bind9 Ubuntu vivid/ubuntu-core *
Bind9 Ubuntu xenial *
Bind9 Ubuntu yakkety *
Bind9 Ubuntu zesty *
Red Hat Enterprise Linux 6 RedHat bind-32:9.8.2-0.62.rc1.el6_9.4 *
Red Hat Enterprise Linux 7 RedHat bind-32:9.9.4-50.el7_3.1 *

References